Search alternatives:
processor » processes (Expand Search)
Showing 1,061 - 1,080 results of 30,198 for search '(processor OR process) (computing)', query time: 0.30s Refine Results
  1. 1061

    Fog Computing Resource Optimization: A Review on Current Scenarios and Resource Management by Dar et al.

    Published 2019-06-01
    “…The unpredictable and huge data generation nowadays by smart computing devices like (Sensors, Actuators, Wi-Fi routers), to handle and maintain their computational processing power in real time environment by centralized cloud platform is difficult because of its limitations, issues and challenges, to overcome these, Cisco introduced the Fog computing paradigm as an alternative for cloud-based computing. …”
    Get full text
    Article
  2. 1062

    From Sensors to Data Intelligence: Leveraging IoT, Cloud, and Edge Computing with AI by Ilenia Ficili, Maurizio Giacobbe, Giuseppe Tricomi, Antonio Puliafito

    Published 2025-03-01
    “…This paper explores innovative approaches to combine these technologies, emphasizing their role in enabling real-time decision-making, predictive analytics, and low-latency data processing. This work analyzes several integration approaches among IoT, cloud/edge computing, and AI through examples and applications, highlighting challenges and approaches to seamlessly integrate these techniques to achieve pervasive environmental intelligence. …”
    Get full text
    Article
  3. 1063

    Fuzzy inference rule based task offloading model (FI-RBTOM) for edge computing by Kashif Ibrahim, Ahthasham Sajid, Ihsan Ullah, Inam Ullah Khan, Keshav Kaushik, S S. Askar, Mohamed Abouhawwash

    Published 2025-03-01
    “…The key objective of edge computing is to reduce delays and provide consumers with high-quality services. …”
    Get full text
    Article
  4. 1064

    A Dynamic Load Balancing Architecture for Fog Computing using Tree Base Resource Arrangement and Flexible Task Prioritization by Bikash Sarma, R. Kumar, Themrichon Tuithung

    Published 2023-03-01
    “…The proposed system is designed so that overall complexity is not upraised and becomes suitable for fog computing architecture with low processing capacity by maintaining the quality of service. …”
    Get full text
    Article
  5. 1065
  6. 1066
  7. 1067
  8. 1068
  9. 1069

    Comparative Analysis of Computational Times of Lithium-Ion Battery Management Solvers and Battery Models Under Different Programming Languages and Computing Architectures by Moin Ahmed, Zhiyu Mao, Yunpeng Liu, Aiping Yu, Michael Fowler, Zhongwei Chen

    Published 2024-12-01
    “…Currently, commercial battery management systems (BMSs) commonly use easier-to-implement and faster equivalent circuit models (ECMs) than their counterpart continuum-scale physics-based models (PBMs). However, despite processing more mathematical and computational complexity, PBMs are attractive due to their higher accuracy, higher fidelity, and ease of integration with thermal and degradation models. …”
    Get full text
    Article
  10. 1070
  11. 1071
  12. 1072

    THE MECHANISM FOR CREATION OF EVENT-DRIVEN APPLICATIONS BASED ON WOLFRAM MATHEMATICA AND APACHE KAFKA by Denis Zolotariov

    Published 2021-03-01
    “…It is shown that the first option is less reliable and consumes much more computer resources during operation. It has been demonstrated that the Mathematica processor is currently not suitable in its pure form for real-time data analysis. …”
    Get full text
    Article
  13. 1073

    Automated process planning system considering machining feature recognition suitable for end-milling using CAD models in STL format by Takayuki HIRAYAMA, Hidenori NAKATSUJI, Isamu NISHIDA

    Published 2024-11-01
    “…This study proposes a method to automatically generate numerical control (NC) programs from 3D computer-aided design (CAD) models in STL (Standard Triangulated Language) format. …”
    Get full text
    Article
  14. 1074
  15. 1075
  16. 1076

    Research on Internet of Things security architecture based on fog computing by Trung Dong Mai

    Published 2019-11-01
    “…The traditional data processing of the Internet of Things is concentrated in cloud computing, and its huge number of devices and massive real-time data transmission are extremely stressful on network bandwidth and cloud computing data centers. …”
    Get full text
    Article
  17. 1077

    Integrating Reconfigurable Hardware-Based Grid for High Performance Computing by Julio Dondo Gazzano, Francisco Sanchez Molina, Fernando Rincon, Juan Carlos López

    Published 2015-01-01
    “…FPGAs have shown several characteristics that make them very attractive for high performance computing (HPC). The impressive speed-up factors that they are able to achieve, the reduced power consumption, and the easiness and flexibility of the design process with fast iterations between consecutive versions are examples of benefits obtained with their use. …”
    Get full text
    Article
  18. 1078

    Design and Application of On-board Computing and Display Control Unit for Mine by CHEN Xiaoxuan, HU Yunqing, ZHANG Guangqiang, LI Xionghui, JIANG Xuezhai, WU Jichang, ZHANG Qiang

    Published 2023-02-01
    “…This paper studies the core components of the collaborative work management system, and puts forward a design method of the on-board computing display control unit that integrates the on-board computing control function and human-computer interaction processing function. …”
    Get full text
    Article
  19. 1079

    Authorization delegation mechanism based trust level in grid computing by DENG Yong1, CHEN Jian-gang 1, WANG Ru-chuan1, ZHANG Lin1

    Published 2008-01-01
    “…To meet the demand of the delegation service during multi-domain authorization in grid computing,the dele-gation negotiation process is presented to realize the authorization delegation of role and permission based on the RBDM and RT model through the introduction of trust levels.The fine-grain authorization delegation policy is given.Finally,the simulation is given to prove the feasibility of the delegation model with trust level.…”
    Get full text
    Article
  20. 1080

    Virtualization Security, Key Issues of Public Cloud Computing Security by Jiaren Jiang

    Published 2015-12-01
    “…With the prosperous development of information technologies and popularity of information-based on a global basis, public application and service of cloud computing has become a trend and inevitable part of enterprise growth.Only an enterprise is speeding up the process,which is playing an increasingly important role in the enterprise growth. …”
    Get full text
    Article